5 Reasons You Need A SIEM Solution

Posted by Nick Walters on Mar 21, 2019 3:49:57 PM

5 Reasons You Need A SIEM Solution

In recent years the business world has seen a shift in data storage and management towards the cloud. In fact, according to some studies, 57% of businesses already utilize a central cloud; and a further 24% plan to do the same.

Read More

Topics: cybersecurity, SIEM, cloud security

What Is IDS/IPS And Why Do You Need It?

Posted by Jason Riddle on Mar 20, 2019 7:27:00 PM

In a world where around the clock protection is often necessary in order to secure your network, IDS (intrusion detection system) and IPS (intrusion prevention system) technologies are coming into their own.

IDS/IPS systems have become increasingly popular as a means of protecting IT systems and managing cybersecurity threats because they deliver robust, personalized protection. But if you’re new to IDS and IPS, you probably want to learn more about what these systems are and why you need them.

Read More

Topics: IDS/IPS, intrusion detection, intrusion prevention, what is IDS/IPS

What You Should Know About SIEM Technology and HIPAA Compliance

Posted by Jason Riddle on Mar 20, 2019 3:04:23 PM

HIPAA’s blessing is also a curse. It’s specifically designed to be flexible, which allows its requirements to apply to organizations of all sizes—from single-physician practices to national healthcare chains. But, that flexibility means HIPAA requirements can be purposely ambiguous.

Read More

Topics: healthcare, healthcare IT, SIEM, HIPAA compliance, HIPAA

What is SIEM and Why Do You Need It?

Posted by Nick Walters on Mar 15, 2019 2:40:36 PM

In this article, we'll discuss what a SIEM solution is, how it works, and why it should serve as an important element in your security operation set-up.

Read More

Outsourcing Security Services Pros and Cons

Posted by Jason Riddle on Mar 11, 2019 12:56:33 PM

Outsourcing cybersecurity is becoming increasingly popular as cybersecurity continues to be one of the fastest growing areas of business. The reason it’s growing so rapidly is simple - the threat of cyber attacks are increasing and it’s putting pressure on companies in almost every industry to hire cybersecurity professionals to manage the growing demand. According to Cybersecurity Ventures, there could be as many as 3.5 million unfilled cybersecurity jobs by 2021. 

Read More

Topics: cybersecurity, cybersecurity operations, MSSP, managed security services

6 Ways to Improve Your Small Business IT Strategy

Posted by Jason Riddle on Mar 7, 2019 9:43:12 AM

In this feature article for MIS Training Institute (MISTI), Cybermaxx’s Jason Riddle weighs in on the topic of how to manage your small-to-medium business IT strategy on a limited budget, specifically focusing on the advantages of working alongside a managed security services provider (MSSP).

Read More

Topics: incident response, data security, cybersecurity operations, MSSP, managed security services, small business

4 Steps To Protect Your Cloud Environment with SIEM

Posted by Nick Walters on Mar 5, 2019 10:29:26 AM

The cloud has become the primary environment that businesses use to store and manage data. According to a recent study, 57% of enterprises already have a central cloud team with another 24% planning one.

Because of this shift, Security Information and Event Management (SIEM) has become a common security control and it’s essential to start protecting your cloud environment with SIEM.

Read More

Topics: cybersecurity, managed security services, SIEM

5 Cybersecurity Policy Necessities for Responding to a Network Intrusion

Posted by Jessica Grube on Mar 4, 2019 7:04:00 AM

A Life of Crime

Have you ever considered a life of crime? If so, cyber crime might be a good field for you to take a look at. Many organizations aren’t very good at responding to network intrusion... so you might actually get away with it. Plus, prosecuting cyber criminals is tough to do; evidence against your dastardly deed seldom stands up in court.

When your victim has a cybersecurity policy in place for responding to network intrusion, clues will be hard for them to come by, and even harder to trace back to you.

Read More

Is It Time To Evaluate Managed IT Security Services Providers?

Posted by Jason Riddle on Mar 3, 2019 8:42:00 AM

A Ponemon study found that the average time it takes for a business to identify a data breach is 191 days - that’s more than 6 months. Concern over the impact of successful cyber attacks is widespread, and they also found that less than half of IT security practitioners surveyed believe they can protect their organizations from cyber threats.

Read More

Topics: cybersecurity, data security, cybersecurity operations, MSSP, managed security services

The Top Healthcare Cybersecurity Vulnerabilities Involving Employees

Posted by Jason Riddle on Mar 2, 2019 7:45:00 AM

When you hear the term ‘healthcare cybersecurity,’ your mind probably thinks of data and computers and all of the hackers and malware that are trying to corrupt networks across the globe.

However, Healthcare Cybersecurity is as much about your employees as it is the technology. A large number of breaches are due to the simple mishandling of information by employees who are simply not paying attention.

Read More

Topics: cybersecurity, data breach, cyber attack, data security, healthcare, healthcare IT

Cybersecurity Central

Knowledge is power.

When it comes to ever-changing advanced cybersecurity threats facing organizations today, knowledge is power. We're here to arm you with everything you need to know to become the security leader you strive to be.

Sign up for the CyberMaxx newsletter to stay up-to-date on:

  • The latest cybersecurity news
  • Need-to-know threat intelligence
  • Insight from industry leaders
  • And more


Subscribe Here!

Recent Insight